1
0
mirror of https://github.com/RIOT-OS/RIOT.git synced 2025-12-17 18:43:50 +01:00
RIOT/cpu/esp32/periph/hwrng.c
2025-09-12 11:25:41 +02:00

65 lines
1.8 KiB
C

/*
* SPDX-FileCopyrightText: 2019 Gunar Schorcht
* SPDX-License-Identifier: LGPL-2.1-only
*/
/**
* @ingroup cpu_esp32
* @ingroup drivers_periph_hwrng
* @{
*
* @file
* @brief Low-level random number generator driver implementation for ESP32x SoCs
*
* @author Gunar Schorcht <gunar@schorcht.net>
*
* @}
*/
#include "cpu.h"
#include "periph_conf.h"
#include "periph/hwrng.h"
#include "bootloader_random.h"
#include "esp_random.h"
void hwrng_init(void)
{
/* If the ADC SAR is used, the Bootloader RNG must not be enabled before
* the random numbers are actually required. The reason is that the
* Bootloader RNG uses the noise of the ADC SAR reference voltage as
* a non-RF entropy source. The calibration of the ADC SAR does not
* work correctly in this case. Therefore, the Bootloader RNG is only
* enabled if random numbers are really required. */
}
/**
* The RNG implementation of the ESP-IDF also uses the hardware RNG register
* RNG_DATA_REG (WDEV_RND_REG) for random number generation, which adds 2 bits
* of entropy at each APB clock cycle when WiFi or BT are enabled. However,
* it ensures that the random numbers are not read faster than generated
* in hardware by including some busy waiting. We therefore use this
* implementation here.
*/
void hwrng_read(void *buf, unsigned int num)
{
if (!IS_USED(MODULE_ESP_WIFI_ANY) && !IS_USED(MODULE_ESP_BLE)) {
/* enable the Bootloader RNG if WiFi and BT are not used */
bootloader_random_enable();
}
esp_fill_random(buf, num);
if (!IS_USED(MODULE_ESP_WIFI_ANY) && !IS_USED(MODULE_ESP_BLE)) {
/* disable the Bootloader RNG to ensure that ADC SAR calibration works */
bootloader_random_disable();
}
}
uint32_t hwrand(void)
{
uint32_t rand;
hwrng_read(&rand, 4);
return rand;
}